Search results for: emotional security
4151 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study
Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey
Abstract:
Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.Keywords: experiences, food security, migrants, perceptions
Procedia PDF Downloads 4234150 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi
Authors: Christopher Manyamba
Abstract:
Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale
Procedia PDF Downloads 3674149 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model
Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee
Abstract:
In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.Keywords: automotive security, HEAVENS, car hacking, security model, information security
Procedia PDF Downloads 3614148 Emotional Processing Difficulties in Recovered Anorexia Nervosa Patients: State or Trait
Authors: Telma Fontao de Castro, Kylee Miller, Maria Xavier Araújo, Isabel Brandao, Sandra Torres
Abstract:
Objective: There is a dearth of research investigating the long-term emotional functioning of individuals recovered from anorexia nervosa (AN). This 15-year longitudinal study aimed to examine whether difficulties in cognitive processing of emotions persisted after long-term AN recovery and its link to anxiety and depression. Method: Twenty-four females, who were tested longitudinally during their acute and recovered AN phases, and 24 healthy control (HC) women, were screened for anxiety, depression, alexithymia, and emotion regulation difficulties (ER; only assessed in recovery phase). Results: Anxiety, depression, and alexithymia levels decreased significantly with AN recovery. However, scores on anxiety and difficulty in identifying feelings (alexithymia factor) remained high when compared to the HC group. Scores on emotion regulation difficulties were also lower in HC group. The abovementioned differences between AN recovered group and HC group in difficulties in identifying and accepting feelings and lack of emotional clarity were no longer present when the effect of anxiety and depression was controlled. Conclusions: Findings suggest that emotional dysfunction tends to decrease in AN recovered phase. However, using an HC group as a reference, we conclude that several emotional difficulties are still increased after long-term AN recovery, in particular, limited access to emotion regulation strategies, and difficulty controlling impulses and engaging in goal-directed behavior, thus suggesting to be a trait vulnerability. In turn, competencies related to emotional clarity and acceptance of emotional responses seem to be state-dependent phenomena linked to anxiety and depression. In sum, managing emotions remains a challenge for individuals recovered from AN. Under this circumstance, maladaptive eating behavior can serve as an affect regulatory function, increasing the risk of relapse. Emotional education and stabilization of depressive and anxious symptomatology after recovery emerge as an important avenue to protect from long-term AN relapse.Keywords: alexithymia, anorexia nervosa, emotion recognition, emotion regulation
Procedia PDF Downloads 1234147 Website Appeal’s Impact on Brand Outcomes: The Mediated Effect of Emotional Attractiveness in the Relationship between Consistent Image and Brand Value
Authors: Salvador Treviño-Martinez, Christian Reich-Lopez
Abstract:
This paper investigates the relationship between website appeal and brand value outcomes (brand attraction, brand loyalty, brand relationship, and brand experience), considering the mediating effect of emotional attractiveness. Data were collected from 221 customers of a quick-service restaurant in Culiacan, Mexico, using an online survey distributed via WhatsApp, following the clients' navigation of the restaurant's website. The study employed PLS-SEM to test the proposed hypotheses and performed 5,000 bootstrapping subsamples to obtain results. The findings indicate that consistent image, a key component of website appeal, has a statistically significant direct and mediated effect (through emotional attractiveness) on the aforementioned brand outcomes. The study's limitations include the convenience sampling method and the single company client database used for the sample composition. This research contributes to the branding and website quality literature by testing nine hypotheses using the Stimuli-Organism-Response theoretical approach in an underexplored context: quick-service restaurants in Latin America.Keywords: website appeal, branding, emotional attractiveness, consistent image, website quality
Procedia PDF Downloads 934146 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 3124145 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 2024144 Developing a Sustainable System to Deliver Early Intervention for Emotional Health through Australian Schools
Authors: Rebecca-Lee Kuhnert, Ron Rapee
Abstract:
Up to 15% of Australian youth will experience an emotional disorder, yet relatively few get the help they need. Schools provide an ideal environment through which we can identify young people who are struggling and provide them with appropriate help. Universal mental health screening is a method by which all young people in school can be quickly assessed for emotional disorders, after which identified youth can be linked to appropriate health services. Despite the obvious logic of this process, universal mental health screening has received little scientific evaluation and even less application in Australian schools. This study will develop methods for Australian education systems to help identify young people (aged 9-17 years old) who are struggling with existing and emerging emotional disorders. Prior to testing, a series of focus groups will be run to get feedback and input from young people, parents, teachers, and mental health professionals. They will be asked about their thoughts on school-based screening methods and and how to best help students at risk of emotional distress. Schools (n=91) across New South Wales, Australia will be randomised to do either immediate screening (in May 2021) or delayed screening (in February 2022). Students in immediate screening schools will complete a long online mental health screener consisting of standard emotional health questionnaires. Ultimately, this large set of items will be reduced to a small number of items to form the final brief screener. Students who score in the “at-risk” range on any measure of emotional health problems will be identified to schools and offered pathways to relevant help according to the most accepted and approved processes identified by the focus groups. Nine months later, the same process will occur among delayed screening schools. At this same time, students in the immediate screening schools will complete screening for a second time. This will allow a direct comparison of the emotional health and help-seeking between youth whose schools had engaged in the screening and pathways to care process (immediate) and those whose schools had not engaged in the process (delayed). It is hypothesised that there will be a significant increase in students who receive help from mental health support services after screening, compared with baseline. It is also predicted that all students will show significantly less emotional distress after screening and access to pathways of care. This study will be an important contribution to Australian youth mental health prevention and early intervention by determining whether school screening leads to a greater number of young people with emotional disorders getting the help that they need and improving their mental health outcomes.Keywords: children and young people, early intervention, mental health, mental health screening, prevention, school-based mental health
Procedia PDF Downloads 954143 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
Authors: Ramon Santana
Abstract:
The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.Keywords: fingerprint, template protection, bio-cryptography, minutiae protection
Procedia PDF Downloads 1694142 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild
Authors: Themistoklis Tzimas
Abstract:
The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development
Procedia PDF Downloads 2794141 Human Security and Human Trafficking Related Corruption
Authors: Ekin D. Horzum
Abstract:
The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.Keywords: human trafficking, human security, human rights, corruption, organized crime
Procedia PDF Downloads 4744140 Optimizing the Passenger Throughput at an Airport Security Checkpoint
Authors: Kun Li, Yuzheng Liu, Xiuqi Fan
Abstract:
High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.Keywords: queue theory, security check, stochatic process, Monte Carlo simulation
Procedia PDF Downloads 2004139 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 3204138 Difficulties in the Emotional Processing of Intimate Partner Violence Perpetrators
Authors: Javier Comes Fayos, Isabel RodríGuez Moreno, Sara Bressanutti, Marisol Lila, Angel Romero MartíNez, Luis Moya Albiol
Abstract:
Given the great impact produced by gender-based violence, its comprehensive approach seems essential. Consequently, research has focused on risk factors for violent behaviour, linking various psychosocial variables, as well as cognitive and neuropsychological deficits with the aggressors. However, studies on affective processing are scarce, so the present study investigates possible emotional alterations in men convicted of gender violence. The participants were 51 aggressors, who attended the CONTEXTO program with sentences of less than two years, and 47 men with no history of violence. The sample did not differ in age, socioeconomic level, education, or alcohol and other substances consumption. Anger, alexithymia and facial recognition of other people´s emotions were assessed through the State-Trait Anger Expression Inventory (STAXI-2), the Toronto Alexithymia Scale (TAS-20) and Reading the mind in the eyes (REM), respectively. Men convicted of gender-based violence showed higher scores on the anger trait and temperament dimensions, as well as on the anger expression index. They also scored higher on alexithymia and in the identification and emotional expression subscales. In addition, they showed greater difficulties in the facial recognition of emotions by having a lower score in the REM. These results seem to show difficulties in different affective areas in men condemned for gender violence. The deficits are reflected in greater difficulty in identifying and expressing emotions, in processing anger and in recognizing the emotions of others. All these difficulties have been related to the use of violent behavior. Consequently, it is essential and necessary to include emotional regulation in intervention programs for men who have been convicted of gender-based violence.Keywords: alexithymia, anger, emotional processing, emotional recognition, empathy, intimate partner violence
Procedia PDF Downloads 1984137 The Benefits of Full Day Kindergarten versus Half Day Kindergarten: Review of Literature
Authors: Majedah Fawzy Abu Alrub
Abstract:
The purpose of this study was to assess the benefits of full-day vs. half-day kindergarten. Research suggests that there is a common trend among full-day kindergarten programs. Academic, social, and emotional benefits are evident, as well as preferential trends among the parents and teachers. The review began by identifying 20 references of literature on full-day kindergarten published in the last two decades (1997-2017). Of these, 20 passed an initial screening designed to identify research reports that examined academic, social, and emotional outcomes of full-day kindergarten programs as compared with half-day programs. Studies indicated that children who attend full-day kindergarten are positively related to high performance through their schools. There is much evidence to support a full-day program for children. Results indicated that full-day programs have obvious benefits for children; however, they may not be the best program for all children.Keywords: preschool, full-day kindergarten, academic benefits, social and emotional benefits
Procedia PDF Downloads 1684136 Emotional Disclosure as Mediator Between Marital Satisfaction and Mental Health Problems in Women with Infertility
Authors: Sadia Saleem
Abstract:
Infertility is a global health concern that may have a long-lasting effect on the psychosocial functioning of an individual. Rich research evidence has shown that women with infertility are at greater risk of adverse psychological experiences than men. The culture plays a risk factor when it comes to infertility. Family is considered as a central focus of a collectivistic culture like Pakistan and having children is the key factor that determines the quality of a marital relationship, individual well-being and overall standing in the society. In this collectivistic cultural context, women usually get the blame and experience more psychological distress and social isolation. A total sample of 121 (M 28.17, SD 4.73) women with primary infertility selected through purposive sampling were tested using Emotional Disclosure Questionnaire, Couple Satisfaction Index and Depression Anxiety Stress Scale. The results indicate that negative emotional disclosure positively mediates the relationship between marital satisfaction and mental health problems (p < .001) in women with primary infertility. The results are discussed in terms of psychosocial counseling and family psychoeducation in Pakistani collectivistic cultural context.Keywords: infertility, couple satisfaction, emotional disclosure, mental health
Procedia PDF Downloads 1624135 Medical Student's Responses to Emotional Content in Doctor-Patient Communication: To Explore Differences in Communication Training of Medical Students and Its Impact on Doctor-Patient Communication
Authors: Stephanie Yun Yu Law
Abstract:
Background: This study aims to investigate into communication between trainee doctors and patients, especially how doctor’s reaction to patient’s emotional issues expressed in the consultation affect patient’s satisfaction. Objectives: Thus, there are three aims in this study, 1.) how do trainee doctors react to patients emotional cues in OSCE station? 2.) Any differences in the respond type to emotional cues between first year students and third year students? 3.) Is response type (reducing space) related to OSCE outcome (patient satisfaction and expert rating)? Methods: Fifteen OSCE stations was videotaped, in which 9 were stations with first-year students and 6 were with third-year students. OSCE outcomes were measured by Communication Assessment Tool and Examiners Checklist. Analyses: All patient’s cues/concerns and student’s reaction were coded by Verona Coding Definitions of Emotional Sequence. Descriptive data was gathered from Observer XT and logistic regression (two-level) was carried out to see if occurrence of reducing space response can be predicted by OSCE outcomes. Results: Reducing space responses from all students were slightly less than a half in total responses to patient’s cues. The mean percentage of reducing space behaviours was lower among first year students when compared to third year students. Patient’s satisfaction significantly (p<0.05) and negatively predicted reducing space behaviours. Conclusions: Most of the medical students, to some extent, did not provide adequate responses for patient’s emotional cues. But first year students did provide more space for patients to talk about their emotional issues when compared to third year students. Lastly, patients would feel less satisfied if trainee doctors use more reducing space responses in reaction to patient’s expressed emotional cues/concerns. Practical implications: Firstly, medical training programme can be tailored on teaching students how to detect and respond appropriately to emotional cues in order to improve underperformed student’s communication skills in healthcare setting. Furthermore, trainee doctor’s relationship with patients in clinical practice can also be improved by reacting appropriately to patient’s emotive cues in consultations (such as limit the use of reducing space behaviours).Keywords: doctors-patients communication, applied clinical psychology, health psychology, healthcare professionals
Procedia PDF Downloads 2174134 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 1264133 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 1364132 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 1184131 Managing Education through, Effective School Community Relationships/Participation for National Security
Authors: Shehu S. Janguza
Abstract:
The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.Keywords: community participation, managing, school community, national security
Procedia PDF Downloads 5924130 Security Issues and Primary School Participation in Kenya
Authors: Rose Mwanza
Abstract:
This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.Keywords: ethnicity, social media, participation in school, poverty, terrorism
Procedia PDF Downloads 604129 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya
Authors: Masese Chuma Benard, Martin Onsiro Ronald
Abstract:
Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)
Procedia PDF Downloads 844128 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3954127 The Role of Arousal in Time Perception: Implications for Emotional Driving
Authors: Ewa Siedlecka
Abstract:
Emotional stress is an important risk factor in the rate and severity of traffic accidents. Moreover, incorrect time perception is implicated in the increase of traffic violations, such as running red lights or collisions. While the role of emotional arousal on perceived time is well-established, the role of physiological arousal in time perception remains unexamined. Specific emotions can be, however, associated with distinct physiological responses. In the current research, two studies examined the role of physiological arousal in time perception. In the first experiment, 41 participants engaged in a cold pressor task and had their time perception measured throughout the experiment. In the second study, 138 participants engaged in either isometric or deep breathing exercises. These activities were designed to simulate the sympathetic and parasympathetic nervous systems, respectively. Participants completed a bisection task to measure time perception in both studies, as well as a physiological response via an Electrocardiography (ECG). Results found that activation of the parasympathetic nervous system is associated with greater time perception. These findings are discussed with reference to models of time perception, as well as implications for emotional driving and misperceptions of speed. It is important to consider the role of physiology in the misperception of time, as these factors can lead to increases in driving accidents.Keywords: emotions, nervous system, physiology, time perception
Procedia PDF Downloads 3224126 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1254125 A CM-Based Model for 802.11 Networks Security Policies Enforcement
Authors: Karl Mabiala Dondia, Jing Ma
Abstract:
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy
Procedia PDF Downloads 3784124 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms
Authors: Saint C. Nguedjip
Abstract:
This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women
Procedia PDF Downloads 1034123 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2334122 Effects of Harmful Alcohol Consumption and Gender on Academic and Personal-Emotional Adjustment in First Year University Students in Spain
Authors: M. F. Páramo, F. Cadaveira, M. S. Rodríguez
Abstract:
The first year at university is a critical period for personal-emotional and academic adjustment in emerging adults. Moreover, some studies show that alcohol consumption increases in young adults on transition to university. The main purpose of this study was to analyze the impact of hazardous alcohol consumption and gender on adjustment to university, understood as a multidimensional construct involving an array of demands. A sample of 300 first year students in Spain completed the Student Adaptation to College Questionnaire (SACQ) and the Alcohol Use Disorders Identification Test (AUDIT). Examination of the data by analysis of variance revealed that adjustment to university was lower in the students undertaking hazardous alcohol consumption than in the other students. Surprisingly, the personal-emotional adjustment of students with hazardous alcohol consumption was not lower than in the other students. Analysis of the gender effect revealed that levels of personal-emotional adjustment were higher in males than in females. This is our first study examining the influence of alcohol consumption on university adjustment. Future research should examine this relationship more closely, with the aim of designing public health strategies focused on limiting abusive consumption of alcohol in university students.Keywords: alcohol consumption, first year university students, gender, SACQ
Procedia PDF Downloads 331